Publications can also be viewed by publication date.


Journal Publications : Conference Publications : Workshops


Journal Publications

Li, Huajing, Lee, Wang-Chien, Sivasubramaniam, Anand, and Giles, C. Lee, Workload Analysis for Scientific Literature Digital Libraries. International Journal of Digital Libraries (IJDL), Special Issue on Very Large Digital Library, 9(2), November 2009.

Xu, Yingqi, Lee, Wang-Chien, Xu, Jianliang, and Mitchell, Gail, Energy-Aware and Time-Critical Geo-Routing in Wireless Sensor Networks. International Journal of Distributed Sensor Networks (IJDSN), 4(4) 2008.

Xueyan Tang, Jianliang Xu, and Wang-Chien Lee, Analysis of TTL-Based Consistency in Unstructured Peer-to-Peer Networks. IEEE Transactions on Parallel and Distributed Systems, December 2008.

Baihua Zheng, Wang-Chien Lee, Ken C. K. Lee, Dik Lun Lee, and Min Shao, A Distributed Spatial Index for Error-Prone Wireless Data Broadcast. Very Large Data Base Journal (VLDBJ), 18(4):959-986 2009.

Yunjun Gao, Baihua Zheng, Gencai Chen, Wang-Chien Lee, Ken C.K. Lee, and Qing Li, Visible Reverse k-Nearest Neighbor Query Processing in Spatial Databases. IEEE Transactions on Knowledge and Data Engineering, 21(9):1314-1327 2009.

Li, Fengjun, Luo, Bo, Liu, Peng, Lee, Dongwon, Mitra, Prasenjit, Lee, Wang-Chien, and Chu, Chao-Hsien, In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. International Journal on Intelligent Control and Systems, Special Session on Information Assurance 2009.

Qijun Gu, Peng Liu, Wang-Chien Lee, and Chao-Hsien Chu, KTR: an Efficient Key Management Scheme For Secure Data Access Control in Wireless Broadcast Services. IEEE Transactions on Dependable and Secure Computing, 6(3) 2009.

Baihua Zheng, Wang-Chien Lee, Peng Liu, Dik Lun Lee, and Xuhua Ding, Tuning On-Air Signatures for Balancing Performance and Confidentiality. IEEE Transactions on Knowledge and Data Engineering, 99(1) 2009.

Ken C. K. Lee, Hong Va Leong, Brandon Unger, Baihua Zheng, and Wang-Chien, Efficient Valid Scope for Location-Dependent Spatial Queries in Mobile Environments . Journal of Software 2009.

Tao-Yang Fu, Wen-Chih Peng, and Wang-Chien Lee, Parallelizing Itinerary-Based KNN Query Processing in Wireless Sensor Networks. IEEE Transactions on Knowledge and Data Engineering, 99(1) 2009.

Ken C. K. Lee, Wang-Chien Lee, and Hong Va Leong, Nearest Surrounder Queries. IEEE Transactions on Knowledge and Data Engineering, 99(1) 2009.

Ken C. K. Lee, Wang-Chien Lee, Baihua Zheng, Huajing Li, and Yuan Tian, An Efficient Skyline Query Processing Framework Based on Z-Order. The VLDB Journal 2009.

X. Wang, C. Pan, P. Liu, and S. Zhu, SigFree: A Signature-free Buffer Overflow Attack Blocker.. IEEE Transactions on Dependable and Secure Computing (TDSC) 2009.

Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, and Adam Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM J. Comput., 38(1):97-139 2008.

Sangwan, R.S., Li-Ping Lin, and Neill, C.J., Structural Complexity in Architecture-Centric Software Evolution. Computer, IEEE Computer Society, 41(10):96-99, Oct. 2008.

Raghvinder S. Sangwan, Pamela Vercellone-Smith, and Phillip A. Laplante, Structural Epochs in the Complexity of Software over Time. IEEE Software, IEEE Computer Society, 25(4):66-73 2008.

Myongsoo Kim and John J. Metzner, A Key Exchange Method for Intelligent Electronic Devices in Distribution Automation. IEEE Transactions on Power Delivery, May 2009 (submitted).

John J. Metzner, A Simple Inner Soft Decision Outer Hard Decision Interactive Encoder/decoder. IEEE Transactions on Information Theory, July/August 2009 (submitted as technical report).

Myongsoo Kim, John J. Metzner, and Kwang Y. Lee, Design and Implementation of a Last-mile Optical Network for Distribution Automation. IEEE Trans. on Power Delivery, 24:1198-1205, July 2009.

John J. Metzner, On Correcting Bursts (and Random Errors) in Vector Symbol (n, k) Cyclic Codes. IEEE Trans. on Information Theory, 54(4):1795-1807, April 2008.

John J. Metzner, Simplification of Packet-Symbol Decoding with Errors, Deletions, Mis-ordering of Packets, and No Sequence Numbers. IEEE Trans. on Information Theory, 55(6):2626-2639, June 2009.

Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, and Patrick McDaniel, A Logical Specification and Analysis for SELinux MLS Policy. ACM Transactions on Information and System Security (TISSEC). To appear.

William Enck, Thomas Moyer, Patrick McDaniel, Shubho Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Yu-Wei Sung, Sanjay Rao, and William Aiello, Configuration Management at Massive Scale: System Design and Experience. IEEE Journal on Selected Areas in Communications (JSAC), 27(3):323-335 2009.

Kevin Butler, Sunam Ryu, Patrick Traynor, and Patrick McDaniel, Leveraging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems. IEEE Transactions on Parallel and Distributed Systems (TPDS) 2009. to appear.

Patrick Traynor, William Enck, Patrick McDaniel, and Tom La Porta, Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks. IEEE/ACM Transactions on Networking (TON), 17(1):40--53 2008.

Kevin Butler, William Enck, Patrick Traynor, Jennifer Plasterr, and Patrick McDaniel. Privacy Preserving Web-Based Email. Algorithms, Architectures and Information Systems Security, Statistical Science and Interdisciplinary Research, World Scientific Computing. 2008. Editor: Bhargab Bhattacharya, Susmita Sur-Kolay, Subhas Nandy and Aditya Bagchi.

Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters, Secure Attribute-Based Systems. Journal of Computer Security (JCS) 2009. to appear.

Patrick McDaniel and Stephen McLaughlin, Security and Privacy Challenges in the Smart Grid. IEEE Security & Privacy Magazine, May/June 2009.

William Enck, Machigar Ongtang, and Patrick McDaniel, Understanding Android Security. IEEE Security & Privacy Magazine, 7(1):50--57, January/February 2009.

Phillip A, Laplante, IT Predictions for 2009. IT Professional, pages 56--63, November/December 2008.

Phillip A. Laplante, Great Papers in Computer Science: A Retrospective. Journal of Scientific and Practical Computing, 2(1):31--35, December 2008.

Norita Ahmad and Phillip Laplante, Using The Analytical Hierarchy Process In Selecting Commercial Real-Time Operating Systems. International Journal of Information Technology & Decision Making, 8(1):151--168, April 2009.

Tom Costello and Phil Laplante, Never Let a Serious Crisis Go to Waste. IT Professional, pages 71-72, May/June 2009.

Phillip A. Laplante, Robert Bucholz, and Albert Elcock, Some Progress in Software Testing Technology. IEEE Reliability Society Technical Operations Annual Technology Report for 2008, IEEE Transactions on Reliability, 58(2):254--256, June 2009.

Jungwoo Ryoo, Phil Laplante, and Rick Kazman, In Search of Architectural Patterns for Software Security. Computer, IEEE Computer Society, 42(6):98-100, June 2009.

Laplante, P., Rockne, J., Montuschi, P., Baldwin, T., Hinchey, M., Shafer, L., Voas, J., and Wenping Wang, Quality in Conference Publishing. IEEE Transactions on Professional Communication, 52(2):183-196, June 2009.

Michael, B., Voas, J., and Laplante, P., Cyberpandemics: History, Inevitability, Response. Security & Privacy, IEEE, 7(1):63-67, Jan.-Feb. 2009.

Eswaran, Sharanya, Johnson, Matthew P., Misra, Archan, and La Porta, Thomas, Distributed Utility-based Rate Adaptation Protocols for Prioritized, Quasi-Elastic Flows. ACM SIGMOBILE Mob. Comput. Commun. Rev., ACM, 13(1):2--13 2009.

Aravindhan Venkateswaran, Venkatesh Sarangan, Thomas F. La Porta, and Raj Acharya, A Mobility-Prediction-Based Relay Deployment Framework for Conserving Power in MANETs. IEEE Transactions on Mobile Computing, IEEE Computer Society, 8(6):750-765 2009.

Yan Sun, La Porta, T. F., and Kermani, P., A Flexible Privacy-Enhanced Location-Based Services System Framework and Practice. IEEE Transactions on Mobile Computing, 8(3):304-321, March 2009.

H. Rowaihy, M.P. Jonson, S. Eswaran, D. Pizzocaro, A. Bar-Noy, T.F. La Porta, A. Misra, and A. Preece, Utility-Based Joint Sensor Selection and Congestion Control for Task-Oriented WSNs. IEEE Asilomar 2008.

Min Shao, Sencun Zhu, Wensheng Zhang, Guohong Cao, and Yi Yang, pDCS: Security and Privacy Support for Data-Centric Sensor Networks. IEEE Transactions on Mobile Computing, 8(8):1023-1038 2009.

Jing Zhao, Ping Zhang, Guohong Cao, and Chita R. Das, Cooperative Caching in Wireless P2P Networks: Design, Implementation, and Evaluation. IEEE Transactions on Parallel and Distributed Systems, IEEE Computer Society, 99(1) 2009. To Appear.

P. McDaniel and A. Prakash, Security Policy Enforcement in the Antigone System. Journal of Computer Security 2005. Accepted for publication. Draft. [Full Paper: pdf Abstract]

Patrick McDaniel, B. Aiello, Kevin Butler, and J. Ioannidis, Origin Authentication in Interdomain Routing. Journal of Communication Networks, Elsevier 2005. Accepted for publication. Draft.

S. Byers, L. Cranor, E. Cronin, D. Kormann, and P. McDaniel, Analysis of Security Vulnerabilities in the Movie Production and Distribution Process. Telecommunications Policy, 28(8):619-644, August 2004. [Full Paper: pdf Abstract]

T. Jaeger, A. Edwards, and X. Zhang, Consistency Analysis of Authorization Hook Placement in the Linux Security Modules Framework. ACM Transactions on Information and System Security (TISSEC), 7(2):175-205, May 2004.

T. Jaeger, X. Zhang, and A. Edwards, Policy Management Using Access Control Spaces. ACM Transactions on Information and System Security (TISSEC), 6(3):327-364, August 2003.

T. Jaeger and J. Tidswell, Practical safety in flexible access control models. ACM Transactions on Information and System Security (TISSEC), 4(2):158-190 2001.

T. Jaeger, A. Prakash, J. Liedtke, and N. Islam, Flexible Control of Downloaded Executable Content. ACM Transactions on Information and System Security, 2(2):177-228, May 1999.

Conference Publications

Lee, Ken C. K., Lee, Wang-Chien, Va Leong, Hong, Unger, Brandon, and Zheng, Baihua, Efficient Valid Scope Computation for Location-Dependent Spatial Queries in Mobile and Wireless Environments. ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, pages 131--140 2009.

Chung, Bruce S. E., Lee, Wang-Chien, and Chen, Arbee L. P., Processing Probabilistic Spatio-Temporal Range Queries over Moving Objects with Uncertainty. EDBT '09: Proceedings of the 12th International Conference on Extending Database Technology, pages 60--71 2009.

Gao, Yunjun, Zheng, Baihua, Lee, Wang-Chien, and Chen, Gencai, Continuous Visible Nearest Neighbor Queries. EDBT '09: Proceedings of the 12th International Conference on Extending Database Technology 2009.

Lee, Ken C. K., Lee, Wang-Chien, and Zheng, Baihua, Fast Object Search on Road Networks. EDBT '09: Proceedings of the 12th International Conference on Extending Database Technology, pages 1018--1029 2009.

Yunjun Gao, Baihua Zheng, Gencai Chen, Wang-Chien Lee, Ken C. K. Lee, and Qing Li, Visible Reverse k-Nearest Neighbor Queries. Proceedings of IEEE International Conference On Data Engineering (ICDE 2009) 2009.

Ken C. K. Lee, Wang-Chien Lee, Hong Va Leong, and Baihua Zheng, OPAQUE: Protecting Path Privacy in Directions Search. Proceedings of IEEE International Conference On Data Engineering (ICDE 2009) 2009.

Yuzhe Tang, Jianliang Xu, Shuigeng Zhou, and Wang-chien Lee, m-LigHT: Indexing Multi-dimensional Data over DHTs. Proceedings of International Conference on Distributed Computing Systems (ICDCS 2009) 2009.

Huajing Li, Zhisheng Li, Wang-Chien Lee, and Dik Lun Lee, A Probabilistic Topic-Based Ranking Framework for Domain Spatial Information Retrieval. Proceedings of International Conference on Research & Development on Information Retrieval 2009.

Huajing Li, Maja Vukovic, Gopal Pingali, and Wang-Chien Lee, SolutionFinder: Intelligent Knowledge Integration and Dissemination for Solution Retrieval in IT Support Services. Proceedings of the International Conference on Service Computing (SCC 2009) 2009.

Ken C.K. Lee, Wang-Chien Lee, Hong Va Leong, and Baihua Zheng, Navigational Path Privacy Protection. Proceedings of the 18th ACM Conference on Information and Knowledge Management 2009.

X. Wang, Y. Jhi, S. Zhu, and P. Liu, Behavior Based Software Theft Detection. Proceeds of 16th ACM Conference on Computer and Communications Security (CCS) 2009.

Y. Yang, S. Zhu, G. Cao, and T. LaPorta, An Active Global Attack Model for Sensor Source Location Privacy: Analysis and Countermeasures.. Proceeds of International Conference on Security and Privacy in Communication Networks (Securecomm) 2009.

L. Xie, X. Zhang, A. Chaugule, T. Jaeger, and S. Zhu, Designing System-level Defenses against Cellphone Malware. Proceedings of 28th International Symposium on Reliable Distributed Systems (SRDS) 2009.

M. Shao, W. Hu, S. Zhu, G. Cao, S. Krishnamurthy, and T. La Porta, Cross-layer Enhanced Source Location Privacy in Sensor Networks. Proceedings of the 6th IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) 2009.

Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, A Social Network Based Patching Scheme for Worm Containment in Cellular Networks. Proceedings of IEEE INFOCOM 2009.

X. Wang, Y-C Jhi, S. Zhu, and P. Liu, STILL: Exploit Code Detection via Static Taint and Initialization Analyses. Proceedings of 24th Annual Computer Security Applications Conference (ACSAC) 2008.

H. Xu, N. Irani, S. Zhu, and W. Xu., Alleviating Parental Concerns for Children's Online Privacy: A Value Sensitive Design Investigation. Proceedings of 29th Annual International Conference on Information Systems (ICIS) (Research in Progress) 2008.

Yevgeniy Dodis, Jonathan Katz, Adam Smith, and Shabsi Walfish, Composability and On-Line Deniability of Authentication. TCC, pages 146-162 2009.

Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, and Adam Smith, Composition attacks and auxiliary information in data privacy. KDD, pages 265-273 2008.

William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick Drew McDaniel, and Adam Smith, Defending Against Attacks on Main Memory Persistence. ACSAC, pages 65-74 2008.

Ivan Damg aard, Yuval Ishai, Mikkel Kr oigaard, Jesper Buus Nielsen, and Adam Smith, Scalable Multiparty Computation with Nearly Optimal Work and Resilience. CRYPTO, pages 241-261 2008.

Shiva Prasad Kasiviswanathan, Homin K. Lee, Kobbi Nissim, Sofya Raskhodnikova, and Adam Smith, What Can We Learn Privately?. FOCS, pages 531-540 2008.

J.F. DeFranco and C.J. Neill, Improving Learning Outcomes using Cognitive Models in Systems Design. Proceedings of ASEE Annual Conference, June 2009.

C.J. Neill, R.S. Sangwan, and D.J. Paulish, An Architecture-Centric Approach for Systems Design. Proceedings of 19th Annual INCOSE International Symposium (INCOSE 2009), July 2009.

Raghvinder S. Sangwan and Colin J. Neill, Characterizing Essential and Incidental Complexity in Software Architectures. Joint Working IEEE/IFIP Conference on Software Architecture 2009 & European Conference on Software Architecture 2009 (WICSA/ECSA 2009), September 2009.

F. Chen, M.P. Johnson, Y. Alayev, A. Bar-Noy, and T. F. La Porta, Who, When, Where; Timeslot Assignment to Mobile Clients. IEEE MASS 2009.

S. Eswaran, A. Misra, and T. La Porta, Control-theoretic Optimization of Utility over Mission Lifetimes in Multi-hop Wireless Networks. IEEE SECON 2009.

F. Chen, M.P. Johnson, A. Bar-Noy, I. Fermin, and T. F. La Porta, Proactive Data Dissemination to Mission Sites. IEEE SECON 2009.

S. Eswaran, M. P. Johnson, A. Misra, and T. La Porta, Adaptive In-Network Processing for Bandwidth and Energy Constrained Mission-Oriented Multi-hop Wireless Networks. IEEE DCOSS 2009.

H. Rowaihy, M. P. Johnson, D. Pizzocaro, A. Bar-Noy, L. Kaplan, T. La Porta, and A. Preece, Detection and Localization Sensor Assignment With Exact and Fuzzy Locations. IEEE DCOSS 2009.

Y. Sun, R. Melervey, and T. F. La Porta, Multiple Backhaul Mobile Access Router Striping. IEEE ICC 2009.

Sandra Rueda, Hayawardh Vijayakumar, and Trent Jaeger, Analysis of Virtual Machine System Policies. Proceedings of the 14th Symposium on Access Control Models and Technologies (SACMAT), June 2009.

Vikhyath Rao and Trent Jaeger, Dynamic Access Control for Multiple Stakeholders. Proceedings of the 14th Symposium on Access Control Models and Technologies (SACMAT), June 2009.

David H. King, Trent Jaeger, Somesh Jha, and Sanjit Seshia, Effective Blame for Information-Flow Violations. Proceedings of the Sixteenth ACM SIGSOFT International Symposium on Foundations of Software Engineering, November 2008.

David H. King, Boniface Hicks, Michael Hicks, and Trent Jaeger, Implicit Flows: Can't live with `em, can't live without 'em. Proceedings of the Fourth International Conference on Information Systems Security, December 2008.

Albert Tannous, Jonathan Trostle, Mohamed Hassan, Stephen E. McLaughin, and Trent Jaeger, New Wide Channel Attacks Targeting Passwords. Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC), December 2008.

Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas La Por ta,, On Cellular Botnets: Measuring the Impact of Malicious Devices on the Cellular Network Core. Proceedings of the 16th ACM Conference on Compute and Communications Security, November 2009.

William Enck, Patrick McDaniel, and Trent Jaeger, PinUP: Pinning User Files to Known Applications. Proceedings of the 24th Annual Computer Security Applications Conference (ACSAC), December 2008.

Sandra Rueda, David H. King, and Trent Jaeger, Verifying Compliance of Trusted Programs. Proceedings of the 17th USENIX Security Symposium, August 2008.

Changlei Liu and Guohong Cao, A Multi-Poller based Energy-Efficient Monitoring Scheme for Wireless Sensor Networks. Proceedings of IEEE INFOCOM Mini Conference 2009.

Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, and Guohong Cao, A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses. Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM) 2009.

Changlei Liu and Guohong Cao, Minimizing the Cost of Mine Selection Via Sensor Networks. Proceedings of the 28th IEEE Conference on Computer Communications (INFOCOM) 2009.

Gao, Wei, Li, Qinghua, Zhao, Bo, and Cao, Guohong, Multicasting in Delay Tolerant Networks: A Social Network Perspective. MobiHoc '09: Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, pages 299--308 2009.

Zhang, Yang, Zhao, Jing, and Cao, Guohong, Roadcast: A Popularity Aware Content Sharing Scheme in VANETs. ICDCS '09: Proceedings of the 2009 29th IEEE International Conference on Distributed Computing Systems, pages 223--230 2009.

Lu Su, Changlei Liu, Hui Song, and Guohong Cao, Routing in Intermittently Connected Sensor Networks. Proceedings of IEEE International Conference on Network Protocols (ICNP), pages 278-287, October 2008.

S. Ryu, K. Butler, P. Traynor, and P. McDaniel, everaging Identity-based Cryptography for Node ID Assignment in Structured P2P Systems. IEEE International Symposium on Security in Networks and Distributed Systems (SSNDS), May 2007.

Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel, Integrating SELinux with Security-typed Languages. Third Annual Security Enhanced Linux Symposium, March 2007.

Boniface Hicks, Kiyan Ahmadizadeh, and Patrick McDaniel, Understanding Practical Application Development in Security-typed Languages. 22st Annual Computer Security Applications Conference (ACSAC), December 2006. [Full Paper: pdf Abstract]

Kevin Butler, William Enck, Jennifer Plasterr, Patrick Traynor, and Patrick McDaniel, Privacy-Preserving Web-Based Email. 2nd International Conference on Information Systems Security (ICISS 2006), December 2006. To Appear.

Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger, Password Exhaustion: Predicting the End of Password Usefulness. 2nd International Conference on Information Systems Security (ICISS 2006), December 2006. Invited Paper.

Kevin Butler, Patrick McDaniel, and William Aiello, Optimizing BGP Security by Exploiting Path Stability. 13th ACM Conference on Computer and Communications Security (CCS'06), November 2006. To Appear.

Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Brent Waters, Secure Attribute-Based Systems. 13th ACM Conference on Computer and Communications Security (CCS'06), November 2006. To Appear.

Patrick Traynor, William Enck, and Patrick McDaniel and Thomas La Porta, Mitigating Open Functionality in SMS-Capable Cellular Networks. Proceedings of the ACM Twelfth Annual International Conference on Mobile Computing and Networking (MobiCom), September 2006.

Patrick Traynor, JaeShung Shin, Barat Madan, Shashi Phoha, and Thomas La Porta, Efficient Group Mobility for Heterogeneous Sensor Networks. Proceedings of the IEEE Vehicular Technology Conference (VTC Fall), September 2006.

Trent Jaeger, David King, Kevin Butler, Jonathan McCune, Ramon Caceres, Serge Hallyn, Joy Latten, Reiner Sailer, and Xiolan Zhang, Leveraging IPsec for Distributed Authorization. 2nd IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm'06), August 2006.

Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, and Patrick McDaniel, Non-Invasive Methods for Host Certification. 2nd IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm'06), August 2006.

Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guohong Cao, and Thomas La Porta, LIGER: Implementing Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks. Proceedings of the 4th ACM International Conference on Mobile Systems, Applications and Services (MobiSys), June 2006.

V. Ganapathy, T. Jaeger, and S. Jha, Retrofitting Legacy Code for Authorization Policy Enforcement. Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006.

Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, and Thomas La Porta, Establishing Pair-Wise Keys In Heterogeneous Sensor Networks. Proceedings of the 25th Annual IEEE Conference on Computer Communications (INFOCOM), April 2006.

Patrick Traynor, Guohong Cao, and Thomas La Porta, The Effects of Probabilistic Key Management on Secure Routing in Sensor Networks. Proceedings of the 2006 IEEE Wireless Communications and Networking Conference (WCNC), April 2006.

Patrick McDaniel, Shubho Sen, Oliver Spatscheck and Jacobus Van der Merwe Bill Aiello, and Charles Kalmanek, Enterprise Security: A Community of Interest Based Approach. Proceedings of Network and Distributed Systems Security 2006 (NDSS), February 2006. (draft).

U. Shankar, T. Jaeger, and R. Sailer, Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. Proceedings of the 2006 ISOC Networked and Distributed Systems Security Symposium, February 2006.

R. Sailer, T. Jaeger, E. Valdez, R. Caceres, R. Perez , S. Berger, J. L. Griffin, and L. van Doorn, Building a MAC-based Security Architecture for the Xen Open-Source Hypervisor. Proceedings of the 21st Annual Computer Security Applications Conference, December 2005.

J. Linwood Griffin, T. Jaeger, R. Perez , R. Sailer, L. van Doorn, and R. Caceres, Trusted Virtual Domains: Toward secure distributed services. Proceedings of the First Workshop on Hot Topics in Systems Dependability, June 2005.

V. Ganapathy, T. Jaeger, and S. Jha, Automatic placement of authorization hooks in the Linux security modules framework. Proceedings of the 12th ACM Conference on Computer and Communications Security, November 2005.

Kevin Butler, Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. Proceedings of 1st International Conference on Information Systems Security (ICISS), December 2005. Invited Paper. [Full Paper: Abstract]

Wesam Lootah, William Enck, and Patrick McDaniel, TARP: Ticket-Based Address Resolution Protocol. 21st Annual Computer Security Applications Conference (ACSAC), December 2005. [Full Paper: Abstract]

William Enck, Patrick Traynor, Patrick McDaniel, and Thomas La Porta, Exploiting Open Functionality in SMS-Capable Cellular Networks. Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), November 2005.

Matthew Pirretti, Sencun Zhu, Vijaykrishnan Narayanan, Patrick McDaniel, Mahmut Kandemir, and and Richard Brooks, The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense. Proceedings of the Innovations and Commercial Applications of Distributed Sensor Networks Symposium, October 2005. (best paper).

Luis Kruger, Somesh Jha, and Patrick McDaniel, Privacy Preserving Clustering. 10th European Symposium on Research in Computer Security (ESORICS '05), September 2005. Milan, Italy. [Full Paper: pdf Abstract]

Ali Al-Lawati, Dongwon Lee, and Patrick McDaniel, Blocking in Private Information Matching. Proceedings of Second International ACM SIGMOD Workshop on Information Quality in Information Systems, July 2005. Baltimore, MD. [Full Paper: pdf]

Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, and Thomas F. La Porta, Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks. MobiQuitous 2005, July 2005. San Diego, CA. [Full Paper: pdf Abstract]

William Aiello, Chuck Kalmanek, Patrick McDaniel, Shubo Sen, and Oliver Spatscheck, Analysis of Communities Of Interest in Data Networks. Passive and Active Measurement Workshop 2005, March 2005. Boston, MA.

S. Byers, L. Cranor, E. Cronin, D. Kormann, and P. McDaniel, Exposing Digital Content Piracy: Approaches, Issues and Experiences. Thirty-Eighth Conference on Signals, Systems, and Computers, Nov 2004. Monterey, CA. Invited paper.

R. Sailer, T. Jaeger, and X. Zhang and L. van Doorn, Attestation-based policy enforcement for remote access. ACM Conference on Computer and Communications Security, pages 308-317 2004.

R. Sailer, X. Zhang, and T. Jaeger and L. van Doorn, Design and Implementation of a TCG-based Integrity Measurement Architecture. USENIX Security Symposium, pages 223-238 2004.

Simon Byers, Lorrie Faith Cranor, Dave Kormann, and Patrick McDaniel, Searching for Privacy: Design and Implementation of a P3P-Enabled Search Engine. Proceedings of 2004 Workshop on Privacy Enhancing Technologies (PETS), May 2004. Toronto, Canada. [Full Paper: pdf Abstract]

H.B. Wang, S. Jha, P. McDaniel, and M. Livny, Security Policy Reconciliation in Distributed Computing Environments. Proceedings of 5th International Workshop on Policies for Distributed Systems and Networks (Policy 2004), IEEE, June 2004. Yorktown Heights, NY, to appear. [Full Paper: pdf Abstract]

T. Jaeger, R. Sailer, and X. Zhang, Resolving Constraint Conflicts. Proceedings of the 2004 ACM Symposium on Access Control Models and Technologies, June 2004.

T. Jaeger, R. Sailer, and X. Zhang, Analyzing Integrity Protection in the SElinux Example Policy. Proceedings of the 12th USENIX Security Symposium, pages 59-74, August 2003.

Geoff Goodell, William Aiello, Tim Griffin, John Ioannidis, Patrick McDaniel, and Avi Rubin, Working Around BGP: An Incremental Approach to Improving Security and Accuracy of Interdomain Routing. Proceedings of Network and Distributed Systems Security 2003 (NDSS), Internet Society, pages 75-85, February 2003. San Diego, CA.

W. Aiello, J. Ioannidis, and P. McDaniel, Origin Authentication in Interdomain Routing. Proceedings of 10th ACM Conference on Computer and Communications Security, ACM, pages 165-178, October 2003. Washington, DC. [Full Paper: pdf Abstract]

E. Cronin, S. Jamin, T. Malkin, and P. McDaniel, On the Performance, Feasibility, and Use of Forward Secure Signatures. Proceedings of 10th ACM Conference on Computer and Communications Security, ACM, pages 131-144, October 2003. Washington, DC. [Full Paper: pdf Abstract]

Patrick McDaniel and Atul Prakash, Methods and Limitations of Security Policy Reconciliation. 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pages 73-87, MAY 2002. Oakland, CA.

X. Zhang, A. Edwards, and T. Jaeger, Using CQUAL for Static Analysis of Authorization Hook Placement. Proceedings of the 11th USENIX Security Symposium, pages 33-48, August 2002.

Patrick McDaniel, Atul Prakash, Jim Irrer, Sharad Mittal, and Thai-Chuin Thuang, Flexibly Constructing Secure Groups in Antigone 2.0. Proceedings of DARPA Information Survivability Conference and Exposition II, IEEE Computer Society Press, pages 55-67, June 2001. Los Angeles, CA.

Hugh Harney, Andrea Colegrove, and Patrick McDaniel, Principles of Policy in Secure Groups. Proceedings of Network and Distributed Systems Security 2001 (NDSS), Internet Society, February 2001. San Diego, CA.

Patrick McDaniel and Sugih Jamin, Windowed Certificate Revocation. Proceedings of IEEE INFOCOM 2000, IEEE, pages 1406-1414, March 2000. Tel Aviv, Israel.

Patrick McDaniel and Avi Rubin, A Response to `Can We Eliminate Certificate Revocation Lists?'. Proceedings of Financial Cryptography 2000, International Financial Cryptography Association (IFCA), February 2000. Anguilla, British West Indies.

Andrwe Adamson, C.J. Antonelli, Kevin Coffman, Patrick McDaniel, and Jim Rees, Secure Distributed Virtual Conferencing. Proceedings of Communications and Multimedia Security (CMS '99), pages 176-190, September 1999. Katholieke Universiteit, Leuven, Belgium.

Patrick McDaniel, Atul Prakash, and Peter Honeyman, Antigone: A Flexible Framework for Secure Group Communication. Proceedings of the 8th USENIX Security Symposium, pages 99-114, August 1999. Washington, DC.

Workshops

Sangwan, Raghvinder S. and Ros, Johannes, Architecture leadership and management in globally distributed software development. LMSA '08: Proceedings of the first international workshop on Leadership and management in software architecture, ACM, pages 17-22 2008.

Sandra Rueda, Yogesh Sreenivasan, and Trent Jaeger, Flexible Security Configuration for Virtual Machines. Proceedings of the 2nd Computer Security Architecture Workshop, October 2008.

Trent Jaeger, Patrick McDaniel, Luke St.Clair, Ramon Caceres, and Reiner Sailer, Shame on Trust in Distributed Systems. Proceedings of the First Workshop on Hot Topics in Security (HotSec '06), July 2006.

Boniface Hicks, Dave King, Patrick McDaniel, and Michael Hicks, Trusted Declassification: High-level policy for a security-typed language. Proceedings of the 1st ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS '06), ACM Press, June 10 2006. [Full Paper: Abstract]

T. Jaeger, J. Tidswell, A. Gefflaut, Y. Park, K. Elphinstone, and J. Liedtke, Synchronous IPC over transparent monitors. ACM SIGOPS European Workshop, pages 189-194 2000.

A. Gefflaut, T. Jaeger, Y. Park, J. Liedtke, K. Elphinstone, V. Uhlig, J. Tidswell, L. Deller, and L. Reuther, The SawMill multiserver approach. ACM SIGOPS European Workshop, pages 109-114 2000.

T. Jaeger, K. Elphinstone, J. Liedtke, V. Panteleenko, and Y. Park, Flexible Access Control using IPC Redirection. Workshop on Hot Topics in Operating Systems 1999.